Add office photos
Employer?
Claim Account for FREE

BT Group

3.9
based on 1.9k Reviews
Filter interviews by

100+ Jarvis Technology and Strategy Consulting Interview Questions and Answers

Updated 19 Feb 2025
Popular Designations

Q1. What is tenant and types? What will happen if we use same subnet in more than one bridge domain of single vrf?

Ans.

Explanation of tenant and types, and the consequences of using the same subnet in multiple bridge domains of a single VRF.

  • A tenant is a logical entity that groups together a set of networking resources and policies.

  • Types of tenants include common tenant, application tenant, and infrastructure tenant.

  • Using the same subnet in multiple bridge domains of a single VRF can cause IP address conflicts and communication issues.

  • This is because each bridge domain is a separate broadcast...read more

View 1 answer

Q2. What is vtep, vxlan, why and where vxlan is used in ACI?

Ans.

VTEP is a virtual tunnel endpoint and VXLAN is a network overlay technology used for scaling out virtualized data centers.

  • VTEP is used to encapsulate and de-encapsulate VXLAN packets.

  • VXLAN is used to extend Layer 2 segments over a Layer 3 network.

  • VXLAN is used in ACI to provide a scalable and flexible network fabric for multi-tenant environments.

  • VXLAN allows for up to 16 million unique network segments.

  • VXLAN uses a 24-bit segment ID to identify the virtual network.

  • VXLAN packe...read more

Add your answer

Q3. Leaf and Spine architecture and why fabric mode is used in between these two?

Ans.

Leaf and Spine architecture is used in data center networks for scalability and redundancy. Fabric mode is used for efficient communication between them.

  • Leaf and Spine architecture is a two-tier network design where leaf switches connect to spine switches.

  • Leaf switches are connected to servers and storage devices while spine switches connect to other switches.

  • This architecture provides high bandwidth, low latency, and redundancy.

  • Fabric mode is used to create a single logical ...read more

Add your answer

Q4. What is ACI and what are features of ACI?

Ans.

ACI stands for Application Centric Infrastructure. It is a software-defined networking solution by Cisco.

  • ACI provides centralized automation and policy-driven application profiles.

  • It enables network administrators to manage the entire infrastructure as a single entity.

  • ACI supports multi-tenancy, security, and integration with third-party tools.

  • It uses a declarative model to define application requirements and automatically configures the network accordingly.

  • ACI includes a har...read more

Add your answer
Discover Jarvis Technology and Strategy Consulting interview dos and don'ts from real experiences

Q5. What is VDC? How many vdc can be created in Chassis having one supervisor?

Ans.

VDC is Virtual Device Context. One supervisor can create up to 4 VDCs.

  • VDC allows multiple virtual switches to be created on a single physical switch

  • Each VDC has its own set of interfaces, VLANs, routing tables, and management interfaces

  • VDCs provide better resource utilization and isolation between different network services

Add your answer

Q6. How do you find out whether a system is compromised or vulnerable?

Ans.

To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.

  • Perform regular vulnerability scans using tools like Nessus or OpenVAS

  • Conduct penetration testing to simulate attacks and identify vulnerabilities

  • Monitor system logs for suspicious activity

  • Stay up-to-date with security patches and updates

  • Use intrusion detection and prevention systems

  • Perform code reviews and security audits

  • Educate employees on security best practi...read more

Add your answer
Are these interview questions helpful?

Q7. Traffic forwarding from end point user of one EPG to another EPG of same leaf? protocols used in flow

Ans.

Traffic forwarding between EPGs on the same leaf is achieved through VXLAN encapsulation and routing protocols.

  • VXLAN encapsulation is used to create a virtual overlay network that spans multiple physical leaf switches.

  • Routing protocols such as OSPF or BGP are used to exchange routing information between the leaf switches.

  • The end point user's traffic is encapsulated in a VXLAN packet and forwarded to the destination leaf switch, where it is decapsulated and forwarded to the de...read more

Add your answer

Q8. What is vpc? What is vpc domain, role of vpc, advantages?

Ans.

VPC stands for Virtual Private Cloud. It is a virtual network that provides a secure and isolated environment within the public cloud.

  • VPC domain is a logical boundary within which resources are created and managed.

  • VPC allows multiple virtual machines to communicate with each other as if they were on the same physical network.

  • VPC provides high availability and fault tolerance by allowing multiple instances to be deployed across multiple availability zones.

  • VPC also allows for t...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is bridge domain and VNI? Which protocol is it?

Ans.

Bridge domain is a layer 2 construct that separates broadcast domains. VNI is a VXLAN Network Identifier used for overlay networking.

  • Bridge domain is used to isolate traffic within a specific VLAN or subnet.

  • VNI is a 24-bit identifier used to identify VXLAN segments in an overlay network.

  • Both bridge domain and VNI are layer 2 constructs used in network virtualization.

  • Bridge domain is not a protocol, but VNI is a protocol used in VXLAN.

  • Bridge domain and VNI are commonly used in...read more

Add your answer

Q10. How traffic will be connected to internet by using ACI?

Ans.

ACI provides connectivity to the internet through external Layer 3 networks.

  • ACI uses external Layer 3 networks to connect traffic to the internet.

  • This is achieved through the use of Border Gateway Protocol (BGP) and External Routing Policies (ERPs).

  • ACI also supports the use of Network Address Translation (NAT) to translate internal IP addresses to external IP addresses.

  • ACI can be configured to use multiple external Layer 3 networks for redundancy and load balancing.

  • ACI also p...read more

Add your answer

Q11. What if IPG? Interface profile and interface policies?

Ans.

IPG refers to Interface Profile Group which is used to group interface profiles. Interface policies define the behavior of interfaces.

  • IPG is used to group interface profiles together for easier management.

  • Interface policies define the behavior of interfaces such as QoS, security, and VLAN settings.

  • IPG can be used to apply interface policies to multiple interfaces at once.

  • For example, you can create an IPG for all access ports and apply an interface policy for VLAN settings to...read more

Add your answer

Q12. 3. What does CIA stand for in cyber security?

Ans.

CIA stands for Confidentiality, Integrity, and Availability in cyber security.

  • Confidentiality refers to protecting sensitive information from unauthorized access.

  • Integrity ensures that data remains accurate, complete, and unaltered.

  • Availability ensures that systems and data are accessible and usable when needed.

  • These three principles form the foundation of a secure cyber environment.

  • Example: Encrypting data to maintain confidentiality, implementing access controls to ensure i...read more

View 1 answer

Q13. Traffic flow from end point of one leaf to to another end point of leaf?

Ans.

Traffic flow from one leaf endpoint to another leaf endpoint is achieved through spine switches.

  • Traffic flows from the endpoint of one leaf switch to the spine switch.

  • The spine switch then forwards the traffic to the endpoint of the other leaf switch.

  • This is achieved through the use of routing protocols such as OSPF or BGP.

  • The spine switches act as intermediaries between the leaf switches.

  • This architecture is known as a leaf-spine network topology.

Add your answer

Q14. Which domain is created to connect VMM domains?

Ans.

The domain created to connect VMM domains is called the Logical Switch domain.

  • Logical Switch domain is created in System Center Virtual Machine Manager (VMM) to connect VMM domains.

  • It is used to provide connectivity between virtual machines and physical networks.

  • It allows for centralized management of virtual switches and network policies.

  • Logical Switch domain can be used to create virtual networks that span multiple hosts and clusters.

  • It supports network virtualization and c...read more

Add your answer

Q15. Why Isis is used in fabric, what is Fabric?

Ans.

ISIS is used in fabric for routing and scalability purposes. Fabric is a network architecture that allows for high-speed, low-latency communication between devices.

  • ISIS is a link-state routing protocol that is commonly used in fabric networks.

  • Fabric is a network architecture that is designed to provide high-speed, low-latency communication between devices.

  • Fabric networks are typically used in data centers and other high-performance computing environments.

  • ISIS is used in fabri...read more

Add your answer

Q16. Name some standard tools used in assessing the security of a system.

Ans.

Standard tools for assessing system security

  • Vulnerability scanners (e.g. Nessus, OpenVAS)

  • Penetration testing tools (e.g. Metasploit, Nmap)

  • Network analyzers (e.g. Wireshark, tcpdump)

  • Log analysis tools (e.g. Splunk, ELK Stack)

  • Firewall and intrusion detection systems (e.g. Snort, Suricata)

Add your answer

Q17. Difference between traditional Mac learning and conversation Mac learning?

Ans.

Traditional Mac learning is static while conversation Mac learning is dynamic.

  • Traditional Mac learning involves manually configuring MAC addresses in the switch's MAC address table.

  • Conversation Mac learning involves the switch dynamically learning MAC addresses based on the source address of incoming frames.

  • Traditional Mac learning is more prone to errors and requires more manual intervention.

  • Conversation Mac learning is more efficient and reduces the risk of errors.

  • Conversat...read more

Add your answer

Q18. What is VRF? why it is used in ACI?

Ans.

VRF stands for Virtual Routing and Forwarding. It is used in ACI to provide network segmentation and isolation.

  • VRF allows multiple virtual networks to coexist on a single physical infrastructure.

  • Each VRF has its own routing table, which provides network segmentation and isolation.

  • In ACI, VRF is used to create tenant networks and provide policy enforcement between them.

  • VRF can also be used to provide secure connectivity between different parts of an organization.

  • VRF is commonl...read more

Add your answer

Q19. Difference between deferred revenue and unearned income

Ans.

Deferred revenue and unearned income are two terms used interchangeably to describe the same concept.

  • Deferred revenue and unearned income refer to money received by a company for goods or services that have not yet been delivered or rendered.

  • Both terms are used interchangeably, but deferred revenue is more commonly used in accounting while unearned income is more commonly used in taxation.

  • Deferred revenue is recorded as a liability on the balance sheet until the goods or serv...read more

View 1 answer

Q20. What is OTV and why need to implement it

Ans.

OTV stands for Overlay Transport Virtualization. It is used to extend Layer 2 connectivity between data centers.

  • OTV is a Cisco proprietary technology

  • It allows for the extension of VLANs across multiple data centers

  • It provides a layer of abstraction between the physical network and the logical network

  • It helps in reducing the complexity of managing multiple data centers

  • It provides a disaster recovery solution by allowing virtual machines to be migrated between data centers

Add your answer

Q21. What is AAEP, why it is used?

Ans.

AAEP stands for Application Centric Infrastructure (ACI) Anywhere Endpoint Policy. It is used to enforce endpoint security policies.

  • AAEP is a policy that defines how endpoints should be treated in an ACI fabric.

  • It is used to enforce security policies for endpoints across different domains.

  • AAEP is used to ensure that endpoints are properly classified and that the correct policies are applied to them.

  • It is an important component of Cisco's ACI architecture.

  • Examples of policies ...read more

Add your answer

Q22. Can we connect spine - spine?

Ans.

Yes, spine-spine connections are possible in a leaf-spine network architecture.

  • Spine-spine connections can be used to increase network capacity and redundancy.

  • However, it is important to ensure that the spine switches are properly configured to avoid loops.

  • Examples of spine-spine connections include MLAG and ECMP.

  • Spine-spine connections are commonly used in data center networks.

Add your answer

Q23. What is orphon port in nexus?

Ans.

An orphan port in Nexus is a port that is not associated with any VLAN or interface.

  • Orphan ports are also known as unused ports.

  • These ports can be used for future expansion or can be disabled to save power.

  • Orphan ports can be identified using the 'show interface status' command.

  • They can also be configured as Layer 3 ports or assigned to a VLAN.

  • Orphan ports can cause security issues if left unsecured.

Add your answer

Q24. How to configure firewall from scratch and what will the first step thta we have to follow ?

Ans.

To configure a firewall from scratch, the first step is to define the security policy.

  • Define the security policy based on the organization's requirements and compliance standards

  • Identify the network topology and determine the zones that need to be protected

  • Select the appropriate firewall hardware or software based on the requirements

  • Configure the firewall rules to allow or deny traffic based on the security policy

  • Test the firewall configuration to ensure it is working as inte...read more

Add your answer

Q25. If in future you need to move from your current location would you be ready to move.

Ans.

Yes, I am open to relocating for future opportunities.

  • I am flexible and willing to move if it aligns with my career goals.

  • I understand the importance of being adaptable in the consulting industry.

  • I have previously relocated for educational or professional purposes.

  • I am excited about the prospect of exploring new locations and cultures.

  • I am prepared to make the necessary arrangements and adjustments for a smooth transition.

View 1 answer

Q26. List any four important components of good customer service.

Ans.

Four important components of good customer service are empathy, responsiveness, knowledge, and professionalism.

  • Empathy: Understanding and addressing the customer's needs and emotions.

  • Responsiveness: Promptly and effectively addressing customer inquiries and issues.

  • Knowledge: Having a deep understanding of the product or service being offered.

  • Professionalism: Maintaining a courteous and respectful attitude towards customers.

Add your answer

Q27. In Paloalto firewall if cluster failure occur then which log would tou have to check ?

Ans.

Check the system logs for cluster failure in Paloalto firewall.

  • Check the system logs for any error messages related to cluster failure

  • Look for logs indicating cluster synchronization issues

  • Review logs for any hardware or software failures in the cluster

Add your answer

Q28. How many logs type we have in monitor tab in panorama?

Ans.

There are four types of logs in the monitor tab in Panorama.

  • Traffic logs

  • Threat logs

  • URL logs

  • Data logs

Add your answer

Q29. What are bare metal servers?

Ans.

Bare metal servers are physical servers without any virtualization layer or operating system installed.

  • Bare metal servers are also known as dedicated servers.

  • They are used for high-performance computing, data-intensive workloads, and applications that require direct access to hardware.

  • Bare metal servers can be customized to meet specific requirements.

  • Examples of bare metal server providers include IBM, Dell, and HP.

Add your answer

Q30. Design a system which is flowing lacs of records per day considering scalaibility, performance and cost effificency.

Ans.

Design a scalable, high-performance, and cost-efficient system for processing large volumes of records daily.

  • Utilize distributed computing to handle high volume of records efficiently

  • Implement data partitioning to distribute workload evenly across multiple nodes

  • Use caching mechanisms to improve performance and reduce latency

  • Optimize data storage by choosing appropriate database technologies like NoSQL or columnar databases

  • Implement auto-scaling to dynamically adjust resources...read more

Add your answer

Q31. What is penetration testing?

Ans.

Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.

  • It involves attempting to exploit weaknesses in a system's defenses

  • The goal is to identify potential security risks and provide recommendations for improvement

  • Penetration testing can be done manually or with automated tools

  • Examples of penetration testing include network penetration testing, web application penetration testing, and social engineering te...read more

Add your answer

Q32. Difference between EBITDA and Operating Income

Ans.

EBITDA is a measure of a company's profitability, while Operating Income is a measure of a company's earnings from its core operations.

  • EBITDA stands for Earnings Before Interest, Taxes, Depreciation, and Amortization

  • Operating Income is also known as Earnings Before Interest and Taxes (EBIT)

  • EBITDA is a more comprehensive measure of a company's financial performance

  • Operating Income only takes into account the company's core operations

  • EBITDA is often used to compare companies in...read more

Add your answer

Q33. a)Microservice Architecture and design b)Explain your project c)Target Sum in array d)Nth highest salary e)Java Fundamentals

Ans.

The interview questions cover topics like Microservice Architecture, project explanation, array manipulation, Nth highest salary, and Java fundamentals.

  • Microservice Architecture involves breaking down a large application into smaller, independent services that communicate with each other.

  • Explain a project you worked on, highlighting the technologies used, challenges faced, and the outcome.

  • Target Sum in array involves finding two numbers in an array that add up to a specific t...read more

Add your answer

Q34. What is the difference between a firewall and a next generation firewall

Ans.

A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.

  • Firewall filters traffic based on IP addresses and ports

  • Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection

  • NGFW can identify and block advanced threats like malware and ransomware

  • NGFW can provide more granular control over applications and users

Add your answer

Q35. How would you go about dealing with a request to sub-let? Talk us through the steps you would take and what kinds of things you look out for

Ans.

When dealing with a request to sub-let, a property manager should follow a systematic approach to ensure compliance and protect the interests of all parties involved.

  • Verify if sub-letting is allowed as per the lease agreement or local laws

  • Request necessary documentation from the tenant, such as a sub-letting application and a copy of the sub-tenant's identification

  • Conduct background checks on the sub-tenant to ensure their suitability

  • Review the proposed sub-letting terms and ...read more

Add your answer

Q36. What is difference between budget and forecast

Ans.

Budget is a plan for future financial activities, while forecast is a prediction of future financial outcomes.

  • Budget is a detailed financial plan for a specific period, usually prepared annually.

  • Forecast is an estimate of future financial outcomes based on past data and trends.

  • Budget is more rigid and set in stone, while forecasts are updated regularly to reflect changing circumstances.

  • Budgets are used for planning and control, while forecasts are used for decision-making and...read more

Add your answer

Q37. What is c and what is routing

Ans.

C is a programming language and routing is the process of selecting the best path for network traffic.

  • C is a high-level programming language used for system programming and developing applications.

  • Routing is the process of selecting the best path for network traffic to reach its destination.

  • Routing protocols like OSPF, BGP, and EIGRP are used to determine the best path for network traffic.

  • Routing tables are used to store information about network topology and available paths....read more

Add your answer

Q38. How do you forecast revenue

Ans.

Revenue forecasting involves analyzing historical data, market trends, and future projections to estimate future revenue.

  • Analyze historical revenue data

  • Consider market trends and industry growth rates

  • Factor in changes in pricing, product offerings, and marketing strategies

  • Use statistical models and forecasting techniques

  • Collaborate with sales and marketing teams for input and insights

Add your answer

Q39. Role of APIC controllers?

Ans.

APIC controllers are used to manage and automate network infrastructure.

  • APIC controllers provide a centralized point of control for network infrastructure.

  • They automate network provisioning, configuration, and policy management.

  • APIC controllers use APIs to communicate with network devices and orchestrate network functions.

  • They enable network administrators to easily manage and monitor network traffic and security.

  • Examples of APIC controllers include Cisco ACI and VMware NSX-T...read more

Add your answer

Q40. What are the parameters of chat

Ans.

Chat parameters include message content, sender, receiver, timestamp, and chat history.

  • Message content: The actual text or media being sent in the chat

  • Sender: The person or entity sending the message

  • Receiver: The person or entity receiving the message

  • Timestamp: The date and time when the message was sent

  • Chat history: Previous messages exchanged between sender and receiver

View 1 answer

Q41. why do we need 5ghz when we already had 2.4 GHz

Ans.

5GHz offers faster speeds, less interference, and more channels compared to 2.4GHz.

  • 5GHz provides faster data transfer speeds compared to 2.4GHz, making it ideal for high-bandwidth activities like streaming HD video or online gaming.

  • 5GHz has less interference from other devices like microwaves and cordless phones that operate on the 2.4GHz frequency.

  • 5GHz offers more available channels, reducing the likelihood of congestion and improving overall network performance.

  • Devices that...read more

Add your answer

Q42. Difference between accrual and provision

Ans.

Accrual is recognition of revenue or expense before payment. Provision is an estimated expense or liability.

  • Accrual is recognized when revenue or expense is incurred, regardless of payment.

  • Provision is an estimated expense or liability that may or may not occur in the future.

  • Accrual is a part of the accounting process, while provision is a part of financial planning.

  • Examples of accrual include salaries payable and interest receivable, while examples of provision include bad d...read more

Add your answer

Q43. What is inside the session table ?

Ans.

The session table typically stores information about active network connections and their associated details.

  • Contains information such as source and destination IP addresses

  • Stores port numbers being used in the connection

  • Tracks the protocol being used (e.g. TCP, UDP)

  • May include timestamps for when the connection was established and last active

Add your answer

Q44. What is HA3 belongs to and work?

Ans.

HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.

  • HA3 stands for Hash-based Message Authentication Code 3

  • It is used in cryptographic hash functions for secure authentication and integrity verification

  • HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)

Add your answer

Q45. What is importance of database when troubleshooting production issue

Ans.

Database is crucial for troubleshooting production issues as it stores critical data and logs for analysis.

  • Database stores important data and logs that can help in identifying the root cause of production issues.

  • By querying the database, developers can track down specific transactions or events that may have caused the problem.

  • Database backups can be used to restore data in case of data corruption or loss during troubleshooting.

  • Monitoring database performance can also help in...read more

Add your answer

Q46. What is the primary reason to switch.

Ans.

The primary reason to switch is to pursue new opportunities and challenges.

  • Seeking career growth and advancement

  • Exploring different industries or sectors

  • Wanting to learn new skills or technologies

  • Improving work-life balance

  • Relocating to a different city or country

View 1 answer

Q47. How to improve quality of chat

Ans.

To improve quality of chat, focus on clear communication, active listening, and timely responses.

  • Use clear and concise language

  • Avoid technical jargon

  • Listen actively to the customer's concerns

  • Respond in a timely manner

  • Provide accurate and helpful information

  • Be empathetic and understanding

  • Offer solutions or alternatives

  • Follow up to ensure customer satisfaction

Add your answer

Q48. What would be bthe first steps if a change fails

Ans.

The first steps if a change fails are to identify the cause, assess the impact, and determine the appropriate corrective actions.

  • Identify the cause of the failure

  • Assess the impact of the failure on the system and users

  • Determine the appropriate corrective actions to prevent the failure from happening again

  • Communicate the failure and corrective actions to stakeholders

  • Implement the corrective actions and monitor the system for any further issues

Add your answer

Q49. What is the difference between start schema and snowflake schema

Ans.

Star schema is a denormalized schema with a single fact table and multiple dimension tables, while snowflake schema is a normalized schema with multiple dimension tables normalized into sub-dimension tables.

  • Star schema has a single fact table surrounded by multiple dimension tables, while snowflake schema has dimension tables normalized into sub-dimension tables.

  • In star schema, dimensions are denormalized, while in snowflake schema, dimensions are normalized.

  • Star schema is ea...read more

Add your answer

Q50. What are the 2 factors to define change urgency

Ans.

The 2 factors to define change urgency are impact and timeline.

  • Impact of the change on the organization or stakeholders

  • Timeline for implementing the change

  • Examples: a critical system failure or a regulatory compliance deadline

Add your answer

Q51. From Routing & Switching

Ans.

What is the difference between routing and switching?

  • Routing is the process of finding the best path for data packets to travel from one network to another

  • Switching is the process of forwarding data packets between devices on the same network

  • Routing is done by routers, while switching is done by switches

  • Routing uses IP addresses to determine the best path, while switching uses MAC addresses

  • Routing is slower than switching, but is necessary for communication between different ...read more

Add your answer

Q52. What is Heart Beat link ?

Ans.

Heart Beat link is a feature in network security that ensures continuous communication between devices.

  • Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.

  • It helps in detecting if a device is still active and reachable on the network.

  • If the Heart Beat link fails, it can trigger alerts or actions to address the issue.

  • Example: In a VPN connection, Heart Beat link can be used to ensure the tunnel remains open and active.

Add your answer

Q53. What is RAN, VLAN, 4G,5G, incident management.

Ans.

RAN stands for Radio Access Network, VLAN is Virtual Local Area Network, 4G and 5G are mobile network technologies, and incident management involves handling and resolving network issues.

  • RAN (Radio Access Network) is a part of a mobile telecommunication system that connects individual devices to other parts of a network through radio connections.

  • VLAN (Virtual Local Area Network) is a technology that allows multiple networks to coexist on the same physical infrastructure, prov...read more

Add your answer

Q54. Design a validator and write a running code within 30 mins

Ans.

Design a validator and write a running code within 30 mins

  • Define the validation rules and criteria

  • Implement the validation logic using a programming language of choice

  • Test the validator with different input data to ensure accuracy

Add your answer

Q55. can you convert switch into router

Ans.

Yes, a switch can be converted into a router by enabling routing features and configuring routing protocols.

  • Enable routing features on the switch

  • Configure routing protocols such as OSPF or EIGRP

  • Assign IP addresses to interfaces

  • Implement access control lists for security

  • Install a routing software image if necessary

Add your answer

Q56. What is the difference between router and switch

Ans.

Routers connect multiple networks together, while switches connect devices within the same network.

  • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

  • Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.

  • Routers determine the best path for data packets to reach their destination, while switches simply forward data to the appropriate devi...read more

Add your answer

Q57. What is risk, what is vlook up and index

Ans.

Risk is the potential for loss or harm, VLOOKUP is a function in Excel to search for a value in a table, INDEX returns a value from a specific row and column in a range.

  • Risk refers to the uncertainty of outcomes that could result in negative consequences.

  • VLOOKUP is a function in Excel used to search for a value in the first column of a table and return a value in the same row from a specified column.

  • INDEX is a function in Excel used to return a value from a specific row and c...read more

Add your answer

Q58. Placement of words and resolution over the chat

Ans.

Placement of words and resolution over chat is important for effective communication.

  • Use proper grammar and punctuation

  • Avoid using all caps or excessive emojis

  • Be clear and concise in your messages

  • Adjust resolution settings to ensure clear display of text

  • Use appropriate font size and style for readability

Add your answer

Q59. How to convince a customer to buy your product.

Add your answer

Q60. What is Application override ?

Ans.

Application override is a feature in network security that allows certain applications to bypass security policies.

  • Application override allows specific applications to bypass firewall rules or other security measures.

  • It is typically used for critical applications that may be blocked by default security settings.

  • Administrators can configure application override rules to allow certain traffic to pass through the network without inspection.

  • This feature can be useful for ensuring...read more

Add your answer

Q61. How do you load data into bigquery using dataflow

Ans.

Data can be loaded into BigQuery using Dataflow by creating a pipeline in Dataflow that reads data from a source and writes it to BigQuery.

  • Create a Dataflow pipeline using Apache Beam SDK

  • Read data from a source such as Cloud Storage or Pub/Sub

  • Transform the data as needed using Apache Beam transformations

  • Write the transformed data to BigQuery using BigQueryIO.write()

Add your answer

Q62. What is network

Ans.

A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another for sharing data and resources.

  • Networks can be classified based on their size (LAN, WAN, MAN)

  • Networks can be wired or wireless

  • Networks can be private (intranet) or public (internet)

  • Networks use protocols like TCP/IP for communication

Add your answer

Q63. What is statefull means ?

Ans.

Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.

  • Stateful devices maintain information about the state of active connections

  • They can differentiate between different connections based on various parameters

  • Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic

Add your answer

Q64. What is risk in project management

Ans.

Risk in project management refers to potential events or situations that could have a negative impact on the project's objectives.

  • Risk is inherent in all projects and can arise from various sources such as technical, financial, environmental, or human factors.

  • Identifying and assessing risks is crucial in project management to develop effective risk management strategies.

  • Examples of risks in project management include budget overruns, delays in project timeline, resource const...read more

Add your answer

Q65. How would you handle a customer ticket?

Ans.

I would prioritize the ticket based on severity, communicate with the customer for more information, troubleshoot the issue, and provide timely updates.

  • Prioritize the ticket based on severity level

  • Communicate with the customer for more information

  • Troubleshoot the issue using relevant tools and resources

  • Provide timely updates to the customer on the progress

Add your answer

Q66. Do you know anything about upselling?

Add your answer

Q67. What is network ,Network topology

Ans.

A network is a group of interconnected devices that communicate with each other. Network topology refers to the layout of these devices.

  • Network topology can be classified into different types such as bus, star, ring, mesh, and hybrid.

  • Bus topology connects all devices to a single cable, while star topology connects all devices to a central hub.

  • Ring topology connects devices in a circular loop, while mesh topology connects devices to each other in a network.

  • Hybrid topology is a...read more

Add your answer

Q68. What are the phase of a vpn

Ans.

The phases of a VPN include initiation, negotiation, data transfer, and termination.

  • Initiation phase involves establishing a connection between the client and server.

  • Negotiation phase involves agreeing on encryption algorithms and keys.

  • Data transfer phase is when actual data is transmitted securely.

  • Termination phase involves closing the connection.

  • Examples: IKEv2 VPN protocol follows these phases.

Add your answer

Q69. What is the role of Ozone Layer?

Ans.

The ozone layer is a protective layer in the Earth's stratosphere that absorbs most of the sun's harmful ultraviolet radiation.

  • Protects living organisms on Earth from harmful ultraviolet radiation

  • Prevents skin cancer, cataracts, and other health issues in humans

  • Helps maintain the Earth's temperature balance by absorbing and reflecting solar radiation

  • Damages to the ozone layer can lead to increased UV radiation reaching the Earth's surface

Add your answer

Q70. What are the modules you have worked

Ans.

I have worked on modules such as user authentication, data processing, API integration, and UI development.

  • User authentication module - Implemented login, registration, and password reset functionalities.

  • Data processing module - Developed algorithms for data manipulation and analysis.

  • API integration module - Integrated third-party APIs for various functionalities.

  • UI development module - Designed and implemented user interfaces using HTML, CSS, and JavaScript.

Add your answer

Q71. What is BT?

Ans.

BT is a multinational telecommunications company headquartered in London, UK.

  • BT stands for British Telecommunications.

  • It provides a range of services including broadband, mobile, and TV.

  • BT is one of the largest telecommunications companies in the world.

  • It was founded in 1969 and privatized in 1984.

  • BT operates in over 180 countries and employs over 100,000 people.

Add your answer

Q72. What is VPN, how it works

Ans.

VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.

  • VPN encrypts data to ensure secure transmission over the internet

  • It masks the user's IP address to maintain anonymity

  • VPN creates a secure tunnel between the user's device and the private network

  • Common uses include remote access to company networks and bypassing geo-restrictions

  • Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost

Add your answer

Q73. What is asp packet capture

Ans.

ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.

  • ASP stands for Application Service Provider.

  • Packet capture involves capturing data packets as they travel across a network.

  • ASP packet capture helps in monitoring network traffic for security purposes.

  • Tools like Wireshark can be used for ASP packet capture.

Add your answer

Q74. What is SVA and its role?

Ans.

SVA stands for Service Level Agreement and it defines the level of service a customer can expect from a company.

  • SVA outlines the specific services provided by a company and the standards to which they will be delivered

  • It includes details such as response times, resolution times, and availability of support

  • For example, a company may have an SVA that guarantees a response to customer inquiries within 24 hours

Add your answer

Q75. What is project management

Ans.

Project management is the practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria.

  • Involves initiating, planning, executing, controlling, and closing a project

  • Focuses on achieving specific goals and meeting success criteria

  • Requires effective communication, organization, and leadership skills

  • Utilizes tools and techniques such as Gantt charts, project schedules, and risk management plan...read more

Add your answer

Q76. what is full form of LASER

Ans.

Light Amplification by Stimulated Emission of Radiation

  • Stands for Light Amplification by Stimulated Emission of Radiation

  • Involves the emission of light through a process of stimulated emission

  • Used in various applications such as surgery, communication, and manufacturing

Add your answer

Q77. Diff between Union and Union All

Ans.

Union combines and removes duplicates, Union All combines without removing duplicates.

  • Union combines result sets and removes duplicates

  • Union All combines result sets without removing duplicates

  • Union is slower than Union All as it involves removing duplicates

  • Union All is faster than Union as it does not remove duplicates

Add your answer

Q78. Bloc structure explanation with clean architecture

Ans.

Bloc structure is a design pattern used in clean architecture to separate business logic from UI.

  • Bloc stands for Business Logic Component

  • It helps in separating UI components from business logic

  • Bloc communicates with the repository layer to fetch data

  • Bloc pattern is commonly used in Flutter for state management

Add your answer

Q79. What is scrum master role

Ans.

The Scrum Master is responsible for ensuring the Scrum team follows the Scrum framework and facilitates the team's progress.

  • Facilitates Scrum events such as daily stand-ups, sprint planning, and retrospectives

  • Removes impediments and shields the team from external distractions

  • Coaches the team on Agile principles and practices

  • Ensures the team adheres to Scrum values and rules

  • Helps the team continuously improve and increase their productivity

Add your answer

Q80. what are kind of topologies?

Ans.

Topologies refer to the arrangement of nodes in a network and how they communicate with each other.

  • Common topologies include bus, star, ring, mesh, and hybrid.

  • Bus topology uses a single cable to connect all devices.

  • Star topology has all devices connected to a central hub.

  • Ring topology connects devices in a circular manner.

  • Mesh topology has each device connected to every other device.

  • Hybrid topology combines two or more different topologies.

Add your answer

Q81. What is VPc in nexus device

Ans.

VPC in Nexus device stands for Virtual Port Channel, which allows multiple physical links to be combined into a single logical link for increased bandwidth and redundancy.

  • VPC allows for active-active links between switches, improving network resiliency

  • It is commonly used in data centers to create a loop-free topology

  • VPC is a feature of Cisco Nexus switches

Add your answer

Q82. What is VDC in Nexus device

Ans.

VDC stands for Virtual Device Context in Nexus device, allowing multiple virtual switches within a single physical switch.

  • VDC allows for logical separation of resources within a single physical switch

  • Each VDC has its own set of resources and configuration, operating independently

  • VDC helps in achieving better resource utilization and network segmentation

Add your answer

Q83. What is Computer Networks

Ans.

Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.

  • Computer networks allow for sharing of resources such as files, printers, and internet connections.

  • They enable communication between devices through protocols like TCP/IP.

  • Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.

Add your answer

Q84. what is resource levelling?

Ans.

Resource levelling is the process of adjusting project schedules to prevent resource overallocation.

  • Resource levelling involves shifting tasks within a project timeline to ensure that resources are not overallocated.

  • It helps in optimizing resource utilization and preventing burnout among team members.

  • Resource levelling may involve delaying certain tasks or hiring additional resources to balance workloads.

  • It is a common practice in project management to ensure smooth project e...read more

Add your answer

Q85. How can I satisfy customers

Ans.

Satisfy customers by providing excellent service and addressing their needs and concerns.

  • Listen actively to their feedback and take action to improve

  • Offer personalized solutions and go above and beyond to exceed expectations

  • Provide timely and efficient service

  • Maintain a positive and friendly attitude

  • Ensure quality products and services

  • Offer incentives and rewards for loyalty

Add your answer

Q86. What is OSI model?

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It helps in understanding how data is transferred from one computer to another over a network.

  • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and communicates with the corresponding layer on the rece...read more

Add your answer

Q87. End to end IP Packet flow

Ans.

End to end IP packet flow refers to the process of transmitting data packets from source to destination through various network layers.

  • IP packet is generated at the source device and encapsulated with source and destination IP addresses.

  • Packet is then forwarded to the default gateway or next hop router.

  • Router checks the routing table and forwards the packet to the next hop or destination network.

  • Packet reaches the destination network and is delivered to the destination device...read more

Add your answer

Q88. Difference between table and views

Ans.

Tables store data in a structured format, while views are virtual tables that display data from one or more tables.

  • Tables store actual data, while views display data dynamically based on the underlying tables.

  • Tables can be modified directly, while views are read-only.

  • Views can combine data from multiple tables, while tables store data in a single structure.

Add your answer

Q89. Treatment of provision and journal entry

Ans.

Provision is an estimated expense recorded in the financial statements, while journal entry is the actual entry made to record the provision.

  • Provision is made for anticipated expenses that have not yet been incurred but are likely to occur in the future.

  • Journal entry is the actual accounting entry made to record the provision in the financial statements.

  • Provision is usually based on estimates and requires judgment by management.

  • Journal entry debits the expense account and cre...read more

Add your answer

Q90. Types of project management approaches

Ans.

There are various project management approaches including Agile, Waterfall, Scrum, Lean, and Kanban.

  • Agile: Iterative and flexible approach, focuses on delivering value to the customer.

  • Waterfall: Sequential approach with distinct phases, each phase must be completed before moving to the next.

  • Scrum: Framework for managing work with an emphasis on iterative and incremental progress.

  • Lean: Focuses on maximizing value while minimizing waste.

  • Kanban: Visual management method to track...read more

Add your answer

Q91. Difference between API and microservices

Ans.

API is a set of rules and protocols for building and interacting with software applications, while microservices is an architectural style that structures an application as a collection of small, autonomous services.

  • API is a communication interface that allows different software systems to interact with each other.

  • Microservices is an architectural approach where an application is composed of small, independent services that communicate with each other over a network.

  • APIs can ...read more

Add your answer

Q92. Sets and their uses in Tableau

Ans.

Sets in Tableau are custom fields that define a subset of data based on certain conditions.

  • Sets can be used to group related data together for analysis

  • Sets can be created based on dimensions or measures

  • Sets can be used in calculations, filters, and visualizations

  • Examples: creating a set of top customers, creating a set of high-value products

Add your answer

Q93. what is 3 point estimation

Ans.

3 point estimation is a technique used in project management to estimate the most likely duration or cost of a project task.

  • Involves estimating the best case scenario, worst case scenario, and most likely scenario for a project task

  • Calculates the average of the three estimates to determine the final estimate

  • Helps in providing a more accurate and realistic estimate for project planning and scheduling

Add your answer

Q94. what is 3 cost estimation

Ans.

Cost estimation is the process of predicting the expense of a project or operation.

  • Cost estimation involves analyzing various factors such as resources, labor, materials, and overhead costs.

  • Different methods can be used for cost estimation, such as bottom-up estimation, parametric estimation, and analogous estimation.

  • Accuracy of cost estimation is crucial for project budgeting and decision-making.

  • Examples of cost estimation tools include Microsoft Project, Oracle Primavera, a...read more

Add your answer

Q95. What is estimation

Ans.

Estimation is the process of predicting or approximating the time, effort, or cost required to complete a task or project.

  • Estimation helps in planning and scheduling tasks.

  • It involves analyzing the requirements, breaking them down into smaller tasks, and assigning effort or time estimates to each task.

  • Estimation techniques can vary, such as expert judgment, historical data analysis, or using estimation tools.

  • Estimation is an iterative process and should be revisited and refin...read more

Add your answer

Q96. packet flow of ASA/FTD

Ans.

Packet flow of ASA/FTD involves ingress, inspection, and egress stages.

  • Ingress stage: Packet enters the ASA/FTD device through an interface.

  • Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.

  • Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.

  • Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is checked against access control list, Egress - packet exits...read more

Add your answer

Q97. SSl handshake explaination

Ans.

SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.

  • Client sends a request to the server to initiate the handshake

  • Server responds with its digital certificate

  • Client verifies the certificate and generates a pre-master secret

  • Both parties exchange encrypted messages using the pre-master secret to establish a secure connection

Add your answer

Q98. Explain Vlan and its types

Ans.

VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.

  • VLANs help in improving network security by isolating traffic between different departments or groups.

  • There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.

  • Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use VLAN tags to identify different VLANs.

  • Example: In a compan...read more

Add your answer

Q99. What is an EWO?

Ans.

An EWO is an Emergency Work Order, a request for immediate action to address a critical issue.

  • EWOs are typically used in urgent situations where immediate action is required to prevent further damage or downtime.

  • Examples of EWOs include network outages, security breaches, or critical hardware failures.

  • EWOs are prioritized over regular work orders due to their urgent nature.

Add your answer

Q100. Longest increasing subsequence

Ans.

Find the longest increasing subsequence in an array of integers.

  • Use dynamic programming to keep track of the longest increasing subsequence ending at each index.

  • Iterate through the array and update the longest increasing subsequence for each index.

  • Return the maximum length of the longest increasing subsequence found.

Add your answer
1
2

More about working at BT Group

#14 Best Large Company - 2022
HQ - London, United Kingdom (UK)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Jarvis Technology and Strategy Consulting

based on 165 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 362 Interview Questions
3.6
 • 337 Interview Questions
3.8
 • 331 Interview Questions
3.9
 • 214 Interview Questions
4.1
 • 207 Interview Questions
4.0
 • 134 Interview Questions
View all
Top BT Group Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter